- Incident Response 9 Reasons for Denial-Of-Service (DoS) Attacks: Why Do They Happen?
DoS attacks happen for many reasons: extortion demands, turf wars between criminal groups, anticompetitive sabotage, punishment for refusing demands, political criticism, training grounds for future...
- Tools Using ICMP Reverse Shell to Remotely Control a Host
ICMP can create covert command-and-control channels that cross many firewalls since organizations often allow ping traffic. The icmpsh tool demonstrates this—a Windows victim issues ICMP echo-request...
- Incident Response Network DDoS Incident Response Cheat Sheet
DDoS response requires preparation before attacks occur: establish ISP contacts, create allowlists of critical source IPs, lower DNS TTLs, and document infrastructure. During attacks, analyze traffic...
- Training My Favorite Information Security Authors in the Past Year
- Career Data Mining Resumes for Computer Attack Reconnaissance
Resumes reveal technologies and version numbers useful for attack reconnaissance—product names, security tools, and infrastructure details. Sites like Indeed allow free, anonymous resume searching....
- Career Review Resumes to Understand Your Career Options
Reviewing resumes of people in your field helps understand career options and paths. Indeed's resume search lets you find resumes by job title or company for free. Look at both peers to compare...